Back to Search Begin New Search Save Search Auto-Notify
How Manchester (CT) Developed a Success...
Uncover how the Town of Manchester, CT, transformed its legacy systems into a thriving, digitally connected communications network. Brianna Smith, the Director of Communications and Civic Engagement for the town, will share their journey in updating community engagement through cutting-edge technology, forming the basis for their digital transformation. She is joined by Granicus’ Michelle Stephens, AICP, as they discuss how the formation...
Add Favorite
Centralized Data Management and Digitiz...
Public safety agencies often face limitations with their existing technology. Current software generates static reports, offering only a snapshot of situations without the ability to illustrate evolving conditions over time. These text-based tables often require IT intervention, causing delays that can last days or even weeks. Tableau has changed the way public safety agencies handle data, moving from static reports to real-time dashboards and...
Add Favorite
Here There Be Dragons: The Role of GenA...
It’s a time of discovery. But will the currents of legislation and business combine with the tides of technical innovation to push us off the map of the “known world”? Will they create new opportunities? FedRAMP authorization is the path to the FedRAMP Marketplace, the world’s largest opportunity for SaaS applications and services. This marketplace serves hundreds of U.S. agencies and departments by setting standards fo...
Add Favorite
Barriers of Digital Service Adoption
Creating seamless customer experiences (CX) has become vital for organizations looking to impact agency service adoption. Understanding and taking the steps to reduce barriers that prevent digital service adoption requires government agencies to provide intuitive and thoughtful digital experiences that guide individuals through the enrollment process. Join Granicus for a complimentary webinar where experts will explore common barriers that imp...
Add Favorite
Learn about Microsoft Sentinel DoD Zero...
According to the Microsoft Digital Defense Report of 2022, the United States government network is the target of nearly half of global nation-state attacks?. The US Department of Defense released its initial Zero Trust reference architecture in 2022.The latest update provides crucial details for implementing the Zero Trust strategy, including clear guidance of 45 separate capabilities and 152 activities needed to adopt a consistent approach. V...
Add Favorite
SLED and Healthcare Technology Workshop...
In this session, attendees learned more about the technology challenges faced by state and local agencies and the implementation of best practices for IT service delivery & infrastructure, observability, compliance and reporting. This interactive session also featured the introduction of SolarWinds® Hybrid Cloud Observability – their most compressive integrated monitoring platform for your infrastructure, network, and application...
Add Favorite
Introduction to Synthetic Data for Comp...
In critical domains such as national security, federal asset management, and economic monitoring, the use of computer vision to extract information for decision-making and analysis is becoming increasingly urgent. The amount of video, photography, and other forms of sensor-based information being collected far outstrips our national capacity to staff and monitor data feeds with human eyes alone. Unfortunately, computer vision accuracy and perf...
Add Favorite
Harnessing Knowvation CSP for Geospatia...
PTFS, AWS & Carahsoft hosted a webinar in the lead up to DoDIIS 2023 in efforts to explore how agencies can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Attendees of this on-demand webinar explored topics inlcuding, AI/ML Text Extraction Document Summarization Machine Learning Document Classification AWS AI/ML Image and Video Recognition The Integration of Knowvation CSP with AWS AI/ML
Add Favorite
ThreatConnect: Threat Intelligence Webinar
During this webinar, attendees learned to understand the complexity of defending an increasingly diverse attack surface against increasingly diverse cyber threats. Also during this exclusive webinar, attendees learned what they should prioritize to make a material impact on their cybersecurity resiliency. During this on-demand webinar, our attendees learned: Details and logistics about DHS' State and Local Cybersecurity Grant Program to bolste...
Add Favorite
Tetrate DoDIIS Webinar: Simplify Kubern...
Managing applications in Kubernetes can be complex. Tetrate’s Service Mesh makes inter-service communication, traffic control, observability and security easier. During this webinar, Tetrate discussed how the Service Mesh addresses challenges that can occur with Kubernetes, making it scalable and flexible. Tune in to this on-demand webinar for insights on: Empowering your organization with Zero Trust security through the Service Mesh Pra...
Add Favorite
Back to Search Begin New Search